What obligations do businesses in the US have to protect personal data?

What obligations do businesses in the US have to protect personal data?

Today, the protection of personal data is the primary concern of every consumer and organizations have to be responsible and make sure they’re collecting it according to the laws and regulations that are in...

​​Watch Out for Online Identity Theft Schemes

It is no wonder that you should educate yourself on identity theft, as it has become so prevalent in the online realm. Not only that, but it has become a cinch for cyber-perpetrators to...
New NachoVPN Attack Exploits VPN Clients Flaw To Execute Arbitrary Commands

NachoVPN Attack Exploits RCE Flaws in SonicWall & Palo Alto VPNs

In a study examining popular corporate VPN clients, including traditional SSL-VPN clients and modern Zero Trust solutions, researchers uncovered vulnerabilities in the trust relationships between these VPN clients and their servers. These flaws demonstrated how...
VPN for HIPAA

10 Best VPN for HIPAA Compliance In 2024

In healthcare, strict adherence to the Health Insurance Portability and Accountability Act (HIPAA) is essential, as HIPAA mandates safeguarding sensitive patient data, known as electronic protected health information (ePHI).  Virtual Private Networks (VPNs) come into...
Threat Actor Claims to have Unauthorized Fortinet VPN Access to 50+ Organizations

Threat Actor Claims to Have Unauthorized Fortinet VPN Access to 50+ Organizations

A threat actor has claimed to possess unauthorized access to Fortinet VPNs of over 50 organizations in the United States. The alarming announcement was made via a post on the dark web, where the...

NordVPN Hacked – Hackers Gained Access to Server and have Taken TLS key

NordVPN hacked, hackers gained access to the server by exploiting a flaw in remote management system provided by the Finland based datacenter. According to NordVPN report, the breach was learned in March 2018, hackers gained...
Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

A critical vulnerability has been discovered in a widely used virtual private network (VPN) software, Libreswan, putting millions of users at risk. The flaw, CVE-2024-3652, could allow attackers to remotely crash the affected systems,...
Hackers Offering Admin Access to 3000 Fortinet SSl-VPN

Hackers Offering Admin Access to 3000 Fortinet SSL-VPN

Hackers are now offering administrative access to over 3000 Fortinet SSL-VPN devices. This breach poses a significant threat to the security of numerous organizations relying on these devices for secure remote access. A tweet from...
APT Hackers Exploiting Ivanti Connect Secure VPN New Zero-Day Flaw in the Wild

APT Hackers Exploiting Ivanti Connect Secure VPN New Zero-Day Flaw in the Wild

Hackers exploit Zero-Day flaws in VPNs as these vulnerabilities are unknown to the software vendor, making them difficult to patch immediately. This can be particularly lucrative for the threat actors seeking to exploit the growing...
VPN Server Post exploitation technique

Post-Exploitation Tactics Hackers Use After Compromising Ivanti, Fortigate VPN Servers

Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate their intrusion after compromising a VPN server. The study focuses on vulnerabilities and no-fix...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...